cybersecurity Y.V

12345678910
Across
  1. 2. Way a programmer may bypass securityto access a computer through trapdoor programs
  2. 5. Security system that forms a virtual perimeter around a network
  3. 6. An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
  4. 7. software that is secretly installed on a user's device to gather sensitive data
  5. 9. Damage or destroy a computer network or system
  6. 10. A malicious computer program
Down
  1. 1. Block elements from sending you information
  2. 3. Unwanted advertising, the email equivalant of physical junk
  3. 4. person who use their skills and talents for good work and keep data safe from other (2_words)
  4. 8. Person who try to gain unauthorized